Published October 20, 2018 | Version v1
Journal article Open

Juvenile Delinquency in the Virtual World: Similarities and Differences between Cyber-Enabled, Cyber-Dependent and Offline Delinquents in the Netherlands

  • 1. Research and Documentation Centre (WODC), the Netherlands

Contributors

  • 1. International Journal of Cyber Criminology

Description

This study examines similarities and differences between juvenile delinquents of self-reported cyber-enabled offenses, cyber-dependent offenses, and offline offenses. The study builds on past studies by examining a broad range of online and offline offenses among a national probability sample of Dutch juveniles aged 12-17 years old. Results show that juveniles who report both offline and online offenses have the most high-risk profile. Within the group online delinquents, juveniles who commit both cyber-dependent and cyber-enabled offenses have the highest risk profile. The results further indicate that cyber-dependent delinquents are a distinct group from online delinquents.

Files

RokvenetalVol12Issue1IJCC2018.pdf

Files (987.6 kB)

Name Size Download all
md5:aedb6efcba499bf6b3d4c85b9bacd240
987.6 kB Preview Download

Additional details

References

  • Agnew, R. (2003). An integrated theory of the adolescent peak in offending. Youth & Society, 34(3), 263-299.doi: 10.1177/0044118X02250094. Babchishin, K. M., Hanson, R. K., & Hermann, C. A. (2011). The characteristics of online sexual offenders: A meta-analysis. Sexual Abuse: A Journal of Research and Treatment, 23(1), 92-123. doi: 10.1177/1079063210370708. Borooah, V. K. (2002). Logit and probit: Ordered and multinomial models. Thousand Oaks, CA: Sage. Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt and B. H. Schell (Eds.), Corporate hacking and technology – driven crime: Social dynamics and implications (pp 38-67). Hershey, PA: IGI Global. doi: 10.4018/978-1-61692-805-6. Bronfenbrenner, U. (1979). The ecology of human development. Cambridge, MA: Harvard University Press. Brunton-Smith, I., & McCarthy, D. J. (2016). Explaining young people's involvement in online piracy: An empirical assessment using the offending crime and justice survey in England and Wales. Victims & Offenders, 11, 509-533. doi: 10.1080/15564886.2015.1121943. Buzzel, T., Foss, D., & Middleton, Z. (2006). Explaining use of online pornography: A test of self-control theory and opportunities for deviance. Journal of Criminal Justice and Popular Culture, 13(2), 96-116. Cappeler, W. (2001). Not such a neat net: some comments on virtual criminality. Social & Legal Studies, 10(2), 229-242. doi: 10.1177/a017404. Catalano, R. F., Haggerty, K. P., Oesterle, S., Fleming, C. B., & Hawkins, J. D. (2004). The importance of bonding to school for healthy development: Findings from the Social Development Research Group. Journal of School Health, 74(7), 252-261. doi: 10.1111/j.1746-1561.2004.tb08281.x. Cohen, L. E., & Felson, M. (1979). Social change and crime rates: A routine activity approach. American Sociological Review, 44(4), 588-608. Retrieved from http://www.jstor.org/stable/2094589. Donner, C. M., Jennings, W. G., & Banfield, J. (2015). The general nature of online and offline offending among college students. Social Science Computer Review, 33(6), 663-679. doi: 10.1177/0894439314555949. Engelen, F., Roels, J., & de Heij, V. (2015). Juvenile Crime Monitor 2015: Research documentation. Heerlen: CBS. Farrington, D. P. (2003). Developmental and life-course criminology: Key theoretical and empirical issues. Criminology, 41(2), 221-256. doi: 10.1111/j.1745-9125.2003.tb00987.x. Farrington, D. P., & Welsh, B. C. (2007). Saving children from a life of crime: Early risk factors and effective interventions. Oxford, UK: Oxford University Press. Farrington, D. P., Loeber, R., Jolliffe, D., & Pardini, D.A. (2008). Promotive and risk processes at different life stages. In R. Loeber, D. P. Farrington, M. Stouthamer-Loeber & H. Raskin White (Eds.), Violence and serious theft. Development and prediction from childhood to adulthood (pp. 169-230). New York: Routledge Taylor & Francis Group. doi: 10.4324/9780203933237. Felson, M. (1998). Crime & Everyday Life. Thousand Oaks, CA: Pine Forge Press. Grabosky, P.N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249. doi: 10.1177/a017405. Hawkins, J. D., Herrenkohl, T. I., Farrington, D. P., Brewer, D., Catalano, R. F., Harachi, T. W., & Cothern, L. (2000). Predictors of youth violence. Washington, DC: Office of Juvenile Justice and Delinquency Prevention. Higgins, G. E. (2005). Can low self-control help understand the software piracy problem? Deviant Behavior, 26(1), 1-24.http://dx.doi.org/10.1080/01639620490497947. Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3-22. doi: 10.1080/14786010600615934. Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1-25. doi: 10.1080/01639620701876577. Holt, T. J., & Bossler, A.M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20-40. doi: 10.1080/01639625.2013.822209. Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress. Theory and prevention of technology-enabled offenses. London and New York: Routledge. Holt, T. J., Bossler, A.M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378-395. doi: 10.1007/s12103-011-9117-3. Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31-61. doi: 10.1080/0735648X.2010.9721287. Junger, M., & Haen Marshall, I. (1997). The interethnic generalizability of social control theory: An empirical test. Journal of Research in Crime and Delinquency, 34(1), 79-112. doi: 10.1177/0022427897034001005. Junger-Tas, J., & Haen Marshall, I. (1999). The self-report methodology in crime research. Crime and Justice: A review of research, 25, 291-367. Retrieved from http://www.jstor.org/stable/1147612. Kerstens, J., & Veenstra, S. (2015). Cyber bullying in the Netherlands: A criminological perspective. International Journal of Cyber Criminology, 9(2), 144-161. doi: 10.5281/zenodo.55055. Khey, D. N., Jennings, W. G., Lanza-Kaduce, L., & Frazier, C. E. (2009). An exploration into the factors associated with specialization among college student computer criminals. Criminal Justice Studies, 22(4), 421-434. doi: 10.1080/14786010903358166. Laan van der, A. M., Blom, M., & Kleemans, E. R.(2009). Exploring long term and short term risk factors for serious delinquency. European Journal of Criminology, 6(5), 419-438. doi: 10.1177/1477370809337882. Laan van der, A. M., & Goudriaan, H. (2016). Juvenile Crime Monitor. Trends in juvenile crime 1997-2015. Den Haag: WODC/CBS. Laan van der, A. M., Veenstra, R., Bogaerts, S., Verhulst, F. C., & Ormel, J. (2010). Serious, minor, and non-delinquents in early adolescence: The impact of cumulative risk and promotive factors. The trails study. Journal of Abnormal Child Psychology, 38, 339-351. doi: 10.1007/s10802-009-9368-3. Liao, T.F. (1994). Interpreting probability models: Logit, probit, and other generalized linear models. Thousand Oaks, CA: Sage. Lipsey, M. W., & Derzon, J. H. (1998). Predictors of violent or serious delinquency in adolescence and early adulthood: A synthesis of longitudinal research. In R. Loeber & D.P. Farrington (Eds.), Serious and violent juvenile offenders. Risk factors and successful interventions (pp. 86-106). London: Sage. Loeber, R., Slot, W.N., & Stouthamer-Loeber, M. (2008). A cumulative developmental model of risk and promotive factors. In R. Loeber, N.W. Slot, P.H. van der Laan, & M. Hoeve (Eds.), Tomorrow's criminals. The development of child delinquency and effective interventions (pp. 133-161). Farnham: Ashgate. Markus, M. Th., Lindhout, I. E., Boer, F., Hoogendijk, T. H. G., & Arrindell, W. A. (2003). Factors of perceived parental rearing styles: The EMBU-C examined in a sample of Dutch primary school children. Personality and Individual Differences, 34(3), 503-519. doi: 10.1016/S0191-8869(02)00090-9. Mason, A. W., & Windle, M. (2002). Gender, self-control, and informal social control in adolescence: A test of three models of the continuity of delinquent behavior. Youth & Society, 33(4), 479-514. doi: 10.1177/0044118X02033004001. McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. London: Home Office. Osgood, D.W., & Anderson, A. L. (2004). Unstructured socializing and rates of delinquency. Criminology, 42(3), 519-549. doi: 10.1111/j.1745-9125.2004.tb00528.x. Osgood, D. W., Wilson, J. K., O'Malley, P. M., Bachman, J. G., & Johnston, L. D. (1996). Routine activities and individual deviant behavior. American Sociological Review, 61(4), 635-655. Retrieved from http://www.jstor.org/stable/2096397. Paternoster, R., Brame, R., Mazerolle, P., & Piquero, A. (1998). Using the correct statistical test for the equality of regression coefficients. Criminology, 36(4), 859-866. doi: 10.1111/j.1745-9125.1998.tb01268.x. Raskauskas, J., & Stoltz, A.D. (2007). Involvement in traditional and electronic bullying among adolescents. Developmental Psychology, 43, 564–575. doi: 10.1037/0012-1649.43.3.564. Rothbart, M. K., Ahadi, S. A., & Evans, D. E. (2000). Temperament and personality: origins and outcomes. Journal of Personality and Social Psychology, 78(1), 122-135. doi: 10.1037//0022-3514.78.1.122. Rutter, M., Giller, H., & Hagell, A. (1998). Antisocial behavior by young people. Cambridge: University Press. Sameroff, A. J., Bartko, T. W., Baldwin, A., Baldwin, C., & Seifer, R. (1998). Family and social influences on the development of child competence. In M. Lewis & C. Feiring (Eds.), Families, risk, and competence (pp 161-168). Mahwah, N.J: Erlbaum. Stattin, H., & Kerr, M. (2000). Parental monitoring: A reinterpretation. Child Development, 71(4), 1072-1085. doi: 10.1111/1467-8624.00210. Stouthamer-Loeber, M., Loeber, R., Wei, E., Farrington, D. P., & Wikström P-O.H.(2002). Risk and promotive effects in the explanation of persistent serious delinquency in boys. Journal of Consulting and Clinical Psychology, 70(1), 111-123. doi: 10.1037//0022-006X.70.1.111. Tcherni, M., Davies, A.L.B., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890-911. doi: 10.1080/07418825.2014.994658. Warr, M. (1993). Parents, peer, and delinquency. Social Forces, 72(1), 247-264. Retrieved from http://www.jstor.org/stable/2580168. Weerman, F. M. (2011). Delinquent peers in context: A longitudinal network analysis of selection and influence effects. Criminology, 49(1), 253-286.doi: 10.1111/j.1745-9125.2010.00223.x. Weijters, G., Van der laan, A. M., & Kessels, R. J. (2016). The concordance between self-reported juvenile crime and police suspects. Den Haag: WODC. Wolfe, S. E., & Higgins, G. E. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10(1), 43-55. Retrieved from http://wcr.sonoma.edu/v10n1/Wolfe.pdf. Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers. Communications of the ACM, 56(4), 64-74. doi: 10.1145/2436256.2436272. Yar, M. (2005a). Computer Hacking: Just Another Case of Juvenile Delinquency? The Howard Journal of Criminal Justice, 44(4), 387-399. doi: 10.1111/j.1468-2311.2005.00383.x. Yar, M. (2005b). The novelty of 'cybercrime'. An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407-427. doi: 101177/147737080556056. Ybarra, M. L., & Mitchell, K. J. (2004). Youth engaging in online harassment: Associations with caregiver-child relationships, internet use, and personal characteristics. Journal of Adolescence, 27, 319. DOI: 10.1016/j.adolescence.2004.03.007.